Sciweavers

530 search results - page 35 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
CMS
2006
175views Communications» more  CMS 2006»
14 years 11 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
ESEM
2010
ACM
14 years 8 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
IJCIS
2002
255views more  IJCIS 2002»
14 years 9 months ago
BioMAS: A Multi-Agent System for Genomic Annotation
The explosive growth in genomic (and soon, expression and proteomic) data, exemplified by the Human Genome Project, is a fertile domain for the application of multi-agent informat...
Keith Decker, Salim Khan, Carl Schmidt, Gang Situ,...
93
Voted
WSC
2004
14 years 11 months ago
Comparative Factory Analysis of Standard FOUP Capacities
Wafers in a 300-mm semiconductor fabrication facility are transported throughout the factory in carriers called front opening unified pods (FOUPs). Two standard capacities of FOUP...
Kranthi Mitra Adusumilli, Robert L. Wright
IJISEC
2007
149views more  IJISEC 2007»
14 years 9 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers